Tag Archives: Apple Watch

When ding-dong goes clingaling

Yes, as titles goes it is a snazzy one, yet there it is. It all started for me about 6 hours ago and I took notice of the news. The initial issue I had with it is usually seen in dictionaries. When you seek Grundlichkeit you get:

Gründlichkeit noun
thoroughness [noun] care; attention to detail; also see German intelligence services.

So knowing what was in stock I decided to take another look, especially in light that the news is now also all over LinkedIn. 

There are two sides. In the first there is that I have no idea whether she is right or wrong, I DID NOT SEE THE EVIDENCE. That needs to be clear from the very first setting. However, as I was looking into an article from August 2021 giving us “When activist Lilith Wittmann drew attention to a security problem with a CDU app, the party pressed criminal charges against her” (source: Berliner Zeitung). There we also see “The Landeskriminalamt – a branch of the police focused on serious crime – is investigating the IT security researcher – as she calls herself. The CDU lodged a criminal complaint against Wittmann after she told the party about a security vulnerability in the CDU-Connect election campaign app. The activist has thus became the target of a paragraph in Germany’s criminal code for which the CDU is chiefly responsible.” And there as a 25 year old, we see that she worked in this field for 10 years, so she started in this field when she was 15. When the BZ adds “Paragraph 202c makes the interception of data a punishable offence. The law is considered controversial because, depending on how it is interpreted, it also covers people who investigate security vulnerabilities in order to report them, not to exploit them. Thanks to §202, Wittmann could now stand trial” Yet that is not enough, the article (at https://www.berliner-zeitung.de/en/the-cdus-leaky-campaign-app-li.176310) also gives us “Due to a security gap in the app software, data on around 500,000 people who had been visited by CDU door-to-door campaigners had been stored on servers without any major security barriers and was therefore basically open to public scrutiny. She could also access the data of about 18,000 users registered with the app – i.e. election workers – as well as 1,300 records of people who had indicated that they wanted to support the election campaign.” The numbers and facts are not that important. It is “Wittmann had been alerted to the potential security vulnerability on Twitter back in May.” It matters that she never discovered it, it does not mean that the issue did not exist, it implies that she is someone’s tool. She becomes the alibi no ones to be. So when I see ‘Apple AirTags Used by German Researcher Uncover Secret Intelligence Agency’ (at https://www.techtimes.com/articles/270997/20220125/apple-airtags-used-german-researcher-uncover-secret-intelligence-agency.htm) I wonder what actually is going on. You see, the Tech Times article gives us “a German researcher has used one to expose the secrets of the government, according to Apple Insider”, this leads us to “Lilith Wittmann, a German activist, claims that she has uncovered how Germany’s Federal Telecommunications Service is just a front for a secret intelligence agency”, is it though? Do not get me wrong, I believe that the Dutch AIVD uses KPN Telecom, GCHQ uses British telecom and so on and that puts the NSA in a bit of a mess (especially if they rely on Sprint Telecom), with a big laughing out loud at the end of that. Yet to see these companies (including the German Federal Telecommunications Service) as an intelligence front is a bit of a stretch. What I see (due to the Berliner Zeitung) is a wannabe with a chip on her shoulder, She is seemingly used as a tool, but to what end is not clear, and it will not be clear until someone digs into the data she was led to. Yes, I am distinct here, Twitter led her to one part, but I reckon that she is someones tool. 

German intelligence (thanks in part to East German Stasi) is unearthly painted with the colour of grundlichkeit, so the story does not fit and 4 years after the Apple Watches leading to a black site makes the Apple gadget a clear no go. And when we see “Some of the steps that she details can no longer be reproduced, like looking up a list of federal authorities online. Similarly, the researcher includes transcripts of phone calls with an official whose phone number that she reports then has stopped working.” We see evidence that is not verifiable and the sinister theorists of a dark nature will rely on “You see! That is evidence” It is not, it really is not. There are other paths to verification and I see none of them, someone is leading us through some rabbit hole telling us to ignore the sideways there but that is a shallow setting to anything that makes sense. I personally see nothing more than an article to set a system up for clicking and receiving digital dollars (an applied click bitch principle). 

And in the middle of it, a self proclaimed activist who worked in cyber security since she was 15, she should know better and she should have been able to present more evidence if there was any. You see German grundlichkeit is one thing, systems with log files are another, the most basic setting in any system and it is not seen here. It is not reported here. Why is that? You see, as I personally see it grundlichkeit also implies records (to show grundlichkeit), records can be tracked, they rely on log files (in many cases) and in many cases it leads to something, not that it is valid, but it could imply that and now we see a cyber operator (to coin a phrase) who uses an Apple AirTag and she does not have a log file to present that shows us something? Weird is it not?

I think she is being used, for what, by whom and to what end remains unknown, but perhaps German intelligence might make something of it, and me? I am hungry and I have deserved an ice cream. I would go for Weißwürste with Haxen and a large Munich pint with Kaiserschmarrn yet I am in Australia, so an ice cream will have to do. 

Unfolding the ravings of a conspiracy theorist makes me hungry, I never knew why.

Enjoy!

Advertisement

Leave a comment

Filed under Media, Military, Politics, Science

Somniare atque in posterum

It was a weird dream, even as nothing really weird seem to happen, the dream was weird. It was my first day at Sony, I was given a cubicle. A man spoke to me ‘We liked how you responded to your previous boss’, even as I have no idea who or what response they were talking about. There was a start package on what seemed to be my desk. There was a new watch in 4 parts. It seemed an almost identical fit to the Apple watch, but it was something we had to put together. There was the housing, the band, the battery and the electronics. It was an employee watch. The electronics were specific Sony, the rest generic. The watch kept us informed, seems to keep the company informed of our every action and it was the lifeline of the employee. A future I predicted in 2013, but not to this degree. Patents fuelled to generalisation, to set parts into a stage of some sort of jigsaw combining and partial usage made no difference, the patents caught it all. From mass produced straps (mine seemed like a transparent cheap looking plastic, but tough and resilient. The housing was a generic product, like it was made to fit a million users and the electronics were specific, it gave the Sony display, time, messages, internal (departmental) information. It is a future we are heading for, instant access and companies having instant access to us, it is not a Sony thing, it will be a global corporate thing. The question is not how it will happen, because it will, when it will happen is also not the question, the issue will son become, how complete will this digital transformation be? The introduction will be clear, the stage will be set, but I wonder how it reflects on us. I see generic housing’s to become almost a fashion statement, some will be smooth metallic, some will be titanium, some will be silver, or even gold but they will all house the generic watch given to us on day one. The corporate mobile tether that can reach us from 4G and beyond. 

A stage where managers can be contacted at home, a zoom conference from their Sony Bravia, all as the need of their global bosses require. A sort of time management per cycle, every cycle. 

I didn’t see much beyond that, but the setting threw me, not what was shown to me, but how casual I looked at the watch, like it was in use everywhere, a technology in a stage where it is the one corporate-employee link that all larger corporations rely on. A new stage of technology that we all accept, those who do not will not remain in any workforce for long. A set service that most corporations will rely on, the larger have their own solution, the others use a cloud based SAAS setting and in this day, with cloud transgressions set to 90%, the larger stage is not where we work, but how secure we can work. In all this, some technologies, the law and politics are running behind all the matter that is being hurdled against us. So whilst we are shown on how ‘New German IT law raises hurdles for Huawei’ to set the hurdle for one, but not the other we see “A key question with any cloud computing service is: “where is the data stored or processed?” It is a key question because location is not fixed in the cloud. Unlike a fixed server in your office or at a data centre in Australia, data in the cloud could potentially be located anywhere in the World and even in multiple data centres in multiple copies worldwide. In fact, a cloud service provider may not even know where the data is residing”, with a reference to “Some exceptions to this rule are provided, for instance, when the controller itself can guarantee that the recipient will comply with the data protection rules” and that is a larger stage where we see personal data in clouds where organised crime uses a system like their personal highway to information and the law doesn’t have a clue what to do to protect people, although they had time to figure out how to stop Huawei. Thi stage is about to explode in all our faces. Whilst we see marketing give the clarion call to ‘AI’, a stage that at present does not exist. The marketeers are feeding the legal minds in a stage that is disjointed. As I personally see it, the law is steered by the greed driven to stop some and clear their way to more profit, all whilst the changes will impact billions and no one is looking into the flaw that we ourselves create.And it is happening in a stage where Times Daily reports ‘Nokia to cut up to 10,000 jobs to ramp up R&D in 5G race’, an article (at https://www.timesdaily.com/business/nokia-to-cut-up-to-10-000-jobs-to-ramp-up-r-d-in-5g/article_5c02981a-a87e-5a02-8bcd-3efac378852f.html) that gives a larger premise. If you have to fire 10% of staff (10.000 jobs) to ramp up Research and development in 5G, how far behind are you?

All this, whilst Huawei is already far beyond that point, how desperate have people become? You need not accept my words, but the numbers by Statista shows that Saudi Arabia (one player that embraced the Huawei solution) is at present over 700% faster than the US, it is the number one 5G place to be, so how far behind will we all be in 2022? If the watches are seemingly the place to be, how many developers will divert to a place like Saudi Arabia to make that part a reality much quicker, all that whilst the EU and the US are nowhere near ready, so how long until others realise the bag of goods we are offered by those not able to deliver, will we hold THEM to account any day soon?

Leave a comment

Filed under IT, Science